Metro Renal AssociatesMetro Renal Associates LLC 821 N Eutaw St STE 407, Baltimore, MD 21201 (410)4391332 (phone), (410)4391335 (fax)
DaVita Downtown Dialysis Center 821 N Eutaw St STE 401, Baltimore, MD 21201 (410)3833450 (phone), (410)3833468 (fax)
Education:
Medical School Shanghai Med Univ, Shanghai First Med Univ, Shanghai, China Graduated: 1991
Procedures:
Dialysis Procedures
Conditions:
Chronic Renal Disease Disorders of Lipoid Metabolism Hypertension (HTN)
Languages:
English
Description:
Dr. Lu graduated from the Shanghai Med Univ, Shanghai First Med Univ, Shanghai, China in 1991. She works in Baltimore, MD and 1 other location and specializes in Nephrology and Internal Medicine. Dr. Lu is affiliated with Medstar Union Memorial Hospital, Mercy Medical Center and University Of Maryland Medical Center.
Surface and Lubricating Group Chemical Engineering Texas A&M University Sep 2011 - May 2014
Research Assistant
Chemical Engineering Texas A&M University Aug 2012 - May 2013
Graduate Teaching Assistant
Research Institute of Petroleum Processing Sinopec May 2005 - Jun 2007
Research Assistant
Research Institute of Petroleum Processing Sinopec Sep 2004 - Jun 2007
Student
Beijing University of Chemical Technology Sep 1999 - Jun 2003
Student
Education:
Texas A&M University 2011 - 2014
Master of Science, Masters, Chemical Engineering
Beijing University of Chemical Technology 1999 - 2003
Bachelors, Chemical Engineering
Skills:
Agenarisk Bayesian Network and Simulation Software For Risk Analysis Process Simulation Using Aspenone and Hysys Dnv Phast Software For Industry Hazard Analysis Microsoft Office Vba Tools For Autonated Office Solutions Chemical Engineering Aspen Plus
Amazon
Applied Scientist In Machine Learning
Ford Motor Company Apr 2016 - Mar 2017
Data and Analytics Scientist
Texas A&M University May 2010 - Dec 2015
Graduate Research Assistant
Texas A&M University May 2013 - Dec 2015
Phd Candidate
Ibm Jun 2015 - Oct 2015
Research Scientist Intern
Education:
Texas A&M University 2011 - 2015
Doctorates, Doctor of Philosophy, Computer Science, Engineering, Industrial Engineering and Operations Research, Philosophy
Texas A&M University 2013
Texas A&M University 2009 - 2011
Masters, Engineering
Tsinghua University 2005 - 2009
Bachelors, Engineering
Chongqing No.1 High School 2002 - 2005
Tsinghua University
Skills:
Algorithms Mathematical Modeling Matlab Statistics R C++ Latex Simulations Python Java Machine Learning Autocad Optimization Objective C Integer Programming Scala Quantitative Finance Artificial Intelligence Data Mining Arcgis Vissim Game Theory Data Analysis Javascript Git Sql
Interests:
Lean Startups Operations Research Business Models Economics Algorithms Books Business Pink Floyd (Band) Health Jimi Hendrix Guns N' Roses (Band) Startup Advice and Strategy Education Finance Science and Technology Music Guitar Las Vegas Entrepreneurship The Big Bang Theory (Tv Series) Algorithmic Game Theory Entertainment Bruce Lee Business Strategy Economic Empowerment Metallica (Band) Tennis
Languages:
English Mandarin
Certifications:
Computational Investing, Part I Passed Level Ii of the Cfa Program Machine Learning Data Manipulation at Scale: Systems and Algorithms Practical Predictive Analytics: Models and Methods Neural Networks and Deep Learning Improving Deep Neural Networks: Hyperparameter Tuning, Regularization and Optimization Structuring Machine Learning Projects License Hgrcsl354W License A6Qrp8Vk6Sed License Lwvkkgflbmy2
Deoleo S.a.
Fp and A and Pricing Analyst
Ameri100
Data Analyst
Atcgsolutions Jan 2017 - May 2017
Business Analyst Internship
Noiseaware May 2016 - Aug 2016
Financial Analyst Internship
Education:
The University of Texas at Dallas 2017 - 2018
Masters
Naveen Jindal School of Management, Ut Dallas 2015 - 2017
Masters, Accounting
Shanghai University 2011 - 2015
Bachelors, International Economics
Skills:
Microsoft Office Microsoft Excel Leadership Powerpoint Teamwork Sas Sql Publications Visio
Becky Gates Children's Center-Division of Student Affairs at Texas A&M University Dec 2015 - Mar 2016
Training Project Leader
Experience Bryan College Station Jun 2014 - Aug 2014
Communication and Marketing Specialist
Department of Recreation Park and Tourism Sciences Jan 2014 - May 2014
'Sled-Fest' Information Technician,Graphic Designer, Volunteer
Department of Agricultural Economics Texas A&M University Jan 2010 - Jun 2011
Research and Teaching Assistant
Texas A&M University Jan 2010 - Jun 2011
Curriculum Manager
Education:
Texas A&M University 2012 - 2016
Doctorates, Doctor of Philosophy, Leadership, Communication, Education, Philosophy
Texas A&M University 2009 - 2013
Masters, Agricultural Economics
Dongbei University of Finance and Economics 2004 - 2008
Bachelors, Economics
Skills:
Economics Data Analysis Microsoft Office Risk Management Google Analytics Higher Education Statistics Instructional Design Research Gamification Event Planning Social Media Marketing Microsoft Excel Graphic Design Elearning Moodle Data Visualization Powerpoint Html Html5 Css Javascript Infographics Spss Public Speaking Teaching Leadership Project Management Social Media Microsoft Word Management Articulate Storyline Marketing Teamwork Training Graphics Time Management English Curriculum Development University Teaching Adult Education Adobe Creative Suite Facebook Lecturing Tutoring Staff Development
Interests:
Children
Languages:
Mandarin English French
Certifications:
Certificate In Agriculture Elearning Development Certificate In Gamification Inbound Certification Event Planning Certificate In Structured Query Language (Sql)
Wei Lu - Coppell TX, US Junan Duan - Lewisville TX, US
Assignee:
Permeo Technologies, Inc. - Irving TX
International Classification:
G06F 15/173
US Classification:
709223, 709227, 370389, 370392
Abstract:
A method and system is disclosed for dynamically managing port and network addresses for a private network using at least one dynamic port management (DPM) driver and a DPM server. The DPM driver is installed on a computer of the private network and the DPM server is installed on a gateway module of the private network. The private network uses a plurality of unregistered network address for its internal uses and has one or more registered network address for communicating with computers outside of the private network. When initiating an application session communicating with at least one computer outside of the private network, a first port is obtained from the DPM driver. A setup process is established for exchanging information between the DPM driver and the DPM server in order to reserve a registered network address and, if the first port is replaceable, for dynamically assigning a second port. The reserved registered network address and the dynamically assigned second port are used for completing communications of the application session.
A method and system is disclosed for controlling packet communications between a first computer network and a second computer network. A driver module implemented in a first computer extracts information about an application session and a network address and port used by the first computer for sending packets of the application session to a second computer in the second computer network when the first computer initially determining a port for the application session. The driver module sends the extracted information to a gateway node of the first computer network, the gateway node being implemented with a server module and the gateway node monitoring one or more packets exchanging between the first and second computer networks. A look-up table is then established for recording the relation between the application and the network address and port used by the first computer for the application. The packet communications between the first and second networks are thus controlled by the gateway node based on the established look-up table.
System And Method For Remote Application Process Control
Cornell J. Kinderknecht - Addison TX, US Wei Lu - Coppell TX, US
Assignee:
Blue Coat Systems, Inc. - Sunnyvale CA
International Classification:
G06F 9/44
US Classification:
717163
Abstract:
A system for controlling an application process comprises an injector, redirect code operable to be placed in a memory of the application process, and a library of redirect functions operable to be referenced by the redirect code during the application process execution. The redirect code is operable to intercept a set of target function calls made by the application process and execute the redirect functions for the intercepted target function calls.
Method And System For Policy-Based Protection Of Application Data
Andrew Leonard Sandoval - Leander TX, US Yariv Kaplan - Austin TX, US Roy Israel Shamir - Austin TX, US Wei Lu - Austin TX, US
Assignee:
Blue Coat Systems, Inc. - Sunnyvale CA
International Classification:
G06F 7/00 G06F 17/00
US Classification:
707695, 726 30
Abstract:
A method and system for protecting an application's operational data are described. According to one aspect of the invention, an administrator interacts with a policy distribution server to generate an operational data protection policy. Next, the policy distribution server generates a data protection application embodying the policy. Various computing devices download and execute the data protection application. The data protection application controls how various applications access data storage objects and data interfaces, based on the operational data protection policy.
Method And System For Tracking Access To Application Data And Preventing Data Exploitation By Malicious Programs
Jose Flores - Austin TX, US Wei Lu - Austin TX, US Ronnie Blewer - Houston TX, US Yariv Kaplan - Austin TX, US
Assignee:
Blue Coat Systems, Inc. - Sunnyvale CA
International Classification:
G06F 12/14
US Classification:
726024000
Abstract:
Provided are a method and system for tracking access to application data and preventing data exploitation by malicious programs. In one example, the method includes shimming into a running process of the system to create at least one monitoring hook to monitor a program, building an execution path of the monitored program, and monitoring a behavior of the execution path for malicious behavior using the monitoring hook.
Content Associative Caching Method For Web Applications
Wei Lu - Austin TX, US Jamshid Mahdavi - San Jose CA, US Darrell Long - Austin TX, US
International Classification:
G06F 15/16 G06F 12/08
US Classification:
709203, 711118, 711E12016
Abstract:
A cache logically disposed in a communication path between a client and a server receives a request for a content item and, in response thereto, requests from the server header information concerning the content item and an initial portion of data that makes up the content item. The cache then computes a first hashing value from the header information and a second hashing value from the initial portion of data. A content identifier is created by combining the first hashing value and the second hashing value. Using the content identifier, the cache determines whether a copy of the content item is stored by the cache; and, if so provides same to the client. Otherwise, the requests the content item from the server and, upon receipt thereof, provides it to the client.
Methods For Treating Inflammatory Disorders And Traumatic Brain Injury Using Stabilized Non-Hematopoietic Epo Short Peptides
The described invention provides methods for treating an inflammatory brain disease, disorder or condition and for treating a traumatic brain injury having an inflammatory component in a subject in need thereof using isolated erythropoietin (EPO)-derived oligopeptides.
System And Method For Presentation Syntax Based Record Capture
A system for capturing information associated with a target application includes a resource monitor, a peripheral monitor, and a capture module. The resource monitor is configured to identify an internal resource associated with the target application, and the peripheral monitor is configured to identify peripheral data passing from a peripheral device to the target application. The capture module is configured to receive graphical element descriptors and user data associated with the target application, receive a replica of the internal resource or the peripheral data associated with the target application, and generate a data record including graphical element descriptors, user data, a replica of the internal resource, a replica of the peripheral data, or any combination thereof.